fbpx

Articles

Musings of the mind. Free resources. Find out what we’re up to.

What is multi-factor authentication?

If your IT support company is ALWAYS fixing your technology… it’s time to switch

Choosing the Right Computer Monitor

Choosing the Right Computer Monitor

Your hardware, software, and internet connection shape your computing experience. The last essential piece of the puzzle? The monitor you use. The first thing you need to consider is what you’ll be using the monitor for most. Gamers will have different requirements than those professionals or families viewing photos. Once you’ve determined monitor usage, you’ll […]

Control Your Cloud Computing Costs for Better ROI

Control Your Cloud Computing Costs for Better ROI

Cloud computing enables the remote work we relied on in 2020 and so much more. No wonder a majority of businesses have at least some data in the cloud. But you don’t also want to be among the bulk of businesses that are overpaying for their cloud services.  Gartner analysts estimate as much as 70% of cloud […]

The biggest security threat to your business is on your payroll

The biggest security threat to your business is on your payroll

Revealed: The real cost of insider attacks – and your strategy to prevent them The chance of your business’s data being breached by an inside attack is high. Most inside attacks are accidental. A well-meaning employee clicks on a bad link by mistake. But there are some attacks caused by malicious attackers, deliberately looking to […]

365 Phishing Example

365 Phishing Example

How is it possible to be phished from a legitimate Microsoft page? These kinds of attacks are becoming more and more popular. Watch our video below to see how it’s done and how you can avoid it! https://www.youtube.com/watch?v=fYM-NVb73cM

Is Misconfiguration Making Your Business Vulnerable?

Is Misconfiguration Making Your Business Vulnerable?

Is Misconfiguration Making Your Business Vulnerable? Cybersecurity attacks on big-name brands or governments are familiar headlines these days. Millions of access credentials are breached, and millions of dollars are lost to ransomware attack. You may think you’re protected, but a single undetected misconfiguration could mean trouble. If you’ve been paying attention, you know no one […]

That’s So 2010: Why Upgrade Your Office Software

That’s So 2010: Why Upgrade Your Office Software

That’s So 2010: Why Upgrade Your Office Software Are you still using Office 2010? It may have served you well over the past decade, but this software reached its end of life in 2020. It’s time to upgrade. Here’s why and what to consider. Software has a typical life span, after which the manufacturer turns […]

Are Your Passwords Compromised?

Are Your Passwords Compromised?

Are Your Passwords Compromised? News of a big brand suffering a data breach is all too common today. But if you don’t get an email from such a company, you could mistakenly be thinking it doesn’t affect you. The thing is, large breaches are happening all the time. Cybercriminals then put access credentials online, and […]

Healthcare Providers Must Prepare for IT Disasters

Healthcare Providers Must Prepare for IT Disasters

Healthcare Providers Must Prepare for IT Disasters Healthcare professionals regularly handle the worst. Whether its broken bones, horrible abscesses, disease, or death, but that doesn’t mean they’re ready for all that can cripple their technology. In 2011, one of the deadliest tornadoes in U.S. history destroyed a large medical center in southwest Missouri. Fortunately, the […]

Why Managed Services Make Your Life Easier

Why Managed Services Make Your Life Easier

Why Managed Services Make Your Life Easier That smile of relief when we fix someone’s technology is a gift of doing IT service. When we get a call out, we’re happy to go out (or log in remotely) to fix what’s broken. We enjoy getting our customers back up and running quickly. Who said saving […]

Why You Need to Uninstall Adobe Flash Player

Why You Need to Uninstall Adobe Flash Player

Why You Need to Uninstall Adobe Flash Player All good things must come to an end – it’s inevitable with computer software. If you’re using Adobe Flash, the day has arrived. It’s time to uninstall Adobe Flash Player. Adobe stopped supporting Flash Player on December 31, 2020. What does this mean? Adobe is no longer […]

Time to Replace Your Laptop Battery?

Time to Replace Your Laptop Battery?

Time to Replace Your Laptop Battery? Your laptop computer may feel like a lifeline. It has everything important on it, both personal and professional! Regrettably, the time does come when you need to replace it. Yet, some computer problems could be solved instead by replacing the laptop battery. Some computers now come with a variation […]

E-accounting: Top 3 Considerations for Online Client Meetings

E-accounting: Top 3 Considerations for Online Client Meetings

E-accounting: Top 3 Considerations for Online Client Meetings Many businesses were teleconferencing before COVID-19. After all, meeting virtually saves both you and your client time, and busy business owners often don’t want to spend the time to make a trip to your office. The coronavirus has hastened the move to e-accounting, but this approach presents […]

Outsourced Help Desk for Accountants

Outsourced Help Desk for Accountants

Outsourced Help Desk for Accountants Accountants are experts at surviving the “busy season.” Tax accountants, for instance, are slammed as annual deadlines draw near. There are slow times, too, but during crazy times, the last thing an accountant wants is essential tech going down. A broken computer or server downtime can be devastating. Say it’s […]

Less Common Cyberattacks for Accountants

Less Common Cyberattacks for Accountants

Less Common Cyberattacks for Accountants Check the news any given day and you might see a report about hackers accomplishing a data breach, or of a ransomware attack encrypting all company data until it pays up. These are the well-known types of cyberattack, but there are less common cyberthreats accountants should be aware of, as […]

7 Benefits of Cloud Computing for Accountants

7 Benefits of Cloud Computing for Accountants

7 Benefits of Cloud Computing for Accountants The public cloud services market has grown dramatically, and, according to Gartner, migrating to the cloud is a top priority for a third of companies. Analysts predicted the market would reach $266 billion in 2020. Accountants enjoy cloud computing, too. This article rounds up the advantages of available […]

Steer Clear of Coronavirus Scams

Steer Clear of Coronavirus Scams

Cyber criminals play on emotions and take advantage of fear. Yes, they’re even using COVID-19 to trick people. Our article covers some of the scams to steal money or install malware. Plus, we offer several strategies to stay cyber safe in these tough times.

#cybersecurity #covid19 #coronavirusscams #scmas #cybercriminals

How to Stay Focused Working from Home

How to Stay Focused Working from Home

Working from home is not for everyone – we’ve all heard that said before – but many of us worldwide are now being forced to work from home. It can be challenging, especially when you have to adapt in the midst of all the other uncertainties COVID-19 has brought. These strategies can help you stay […]

Is Your Business’ IT Ready for the Coronavirus?

Is Your Business’ IT Ready for the Coronavirus?

With the Coronavirus in the news, businesses are getting ready to have employees work from home. Is your IT up to the task?

#IT #coronavirus #covid19 #remoteworking #remoteworkforce

5 Red Flags of Phishing Emails: Think Before You Click

5 Red Flags of Phishing Emails: Think Before You Click

A single click can be the difference between maintaining data security and suffering massive financial losses. From the moment just one employee takes the bait in a phishing email, your business is vulnerable to data breaches and extensive downtime. Quickly spot the red flags and put phishing emails where they belong: 1. Poor spelling and […]

Remote IT Will Create Tech That Works for You

Remote IT Will Create Tech That Works for You

Remote IT Will Create Tech That Works for You There are few things as frustrating as IT issues getting in the way of your work. Even the simplest of problems can break your flow, ruin your productivity, and waste your time. IT should be working to boost your day instead of slowing you down. Tripping […]

Professional Businesses Deserve Professional Setup

Professional Businesses Deserve Professional Setup

Professional Businesses Deserve Professional Setup Watching a business grow is as satisfying as it is rewarding. Whether opening a new office, starting a new department, or bringing in a new employee; it’s a positive step in the right direction. Upward growth often requires new office tech and IT changes to bring new staff fully online. […]

SSD: Make Your Old Computer Your New Computer

SSD: Make Your Old Computer Your New Computer

SSD: Make Your Old Computer Your New Computer The solid-state drive (SSD) has swiftly become the go-to upgrade to breathe new life into an ageing computer, and for good reason too. An SSD swiftly brings an old laptop or desktop up to date with modern machines in just a single step. The price of solid-state […]

Don’t Get Hooked by Spear Phishing Attacks

Don’t Get Hooked by Spear Phishing Attacks

Phishing attacks have been around for a long time in IT. Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and effective. Today, a more modern and more effective version of the same attack is commonly used. […]

Time to Refresh Your Passwords

Time to Refresh Your Passwords

We often tend to be creatures of habit, particularly when it comes to technology. Passwords are a prime example. Many of us use the same logins for multiple websites and applications because we don’t have a photographic memory. A large percentage of users aren’t aware that this is one of the most significant security dangers […]

Marriott Hotels Exposed 500 Million Customer Records. Make Sure Your Business Doesn’t Suffer the Same Fate.

Marriott Hotels Exposed 500 Million Customer Records. Make Sure Your Business Doesn’t Suffer the Same Fate.

Up to 500 million travelers could be compromised as hotel chain Marriott International have announced a security breach in their guest database. Analysts recently alerted the firm to a vulnerability that has granted hackers access to the hotel chain’s systems since 2014. The firm announced their Starwood Preferred Guest (SPG) loyalty program was compromised for […]

Beat the IT Burden

Beat the IT Burden

Technology today allows us to accomplish more tasks faster than ever before. Paperless documents, remote collaboration and video conferencing have all lowered the costs and increased the speed of everyday business at an extraordinary rate. The benefits of modern IT does however, come at a cost. Consistent maintenance has become a critical component of almost […]

More Than A Virus, Common Malware to Watch Out For

More Than A Virus, Common Malware to Watch Out For

More Than A Virus, Common Malware to Watch Out For The term “virus” is often used to describe many different types of infection a computer might have. A virus, when used as a blanket term, can describe any number of potential computer programs. What these programs have in common are they are typically designed to […]

Stay Ahead of the Curve with an IT Lifecycle Plan

Stay Ahead of the Curve with an IT Lifecycle Plan

Stay Ahead of the Curve with an IT Lifecycle Plan All appliances have an effective lifespan. Computers are no different. In some cases, parts physically fail after years of service, in others they simply become too slow and too ineffective to keep doing the job. Hardware failures and IT issues can cost big in productivity […]

How Losing a Mobile Device Puts Your Entire Business at Risk

How Losing a Mobile Device Puts Your Entire Business at Risk

How Losing a Mobile Device Puts Your Entire Business at Risk Losing a mobile phone or laptop is an experience that everyone dreads. The expense and inconvenience of buying a new device is unpleasant, but only represents a fraction of the damage done when a device is misplaced. The cost of data contained within every […]

How to Tell if You’ve Gotten Hacked

How to Tell if You’ve Gotten Hacked

How to Tell if You’ve Gotten Hacked Being hacked is the single biggest fear of most computer users. Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control. But are hackers really inside your machine, stealing your information? Or should we be on the lookout […]

Should You Repair, Upgrade, or Replace Your Computer?

Should You Repair, Upgrade, or Replace Your Computer?

Should You Repair, Upgrade, or Replace Your Computer? Like many valuable things we buy, new computers suffer from wear and tear over time. Our computers are particularly vulnerable as we have placed more and more demands on them every year. New machines have got faster, quieter, more reliable, and more capable over time. At the […]

What?s That Weird Noise Coming from Your Computer?

What?s That Weird Noise Coming from Your Computer?

What?s That Weird Noise Coming from Your Computer? New computers are whisper quiet, seeming to run on pure magic, but after a while computers can start making some pretty weird noises. Clicks, clunks, and about-to-take-off jet noises are the most common, but when should you worry? Your computer has a number of moving parts and […]

5 Tech Travel Tips You Can Use

5 Tech Travel Tips You Can Use

5 Tech Travel Tips You Can Use Travelling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, ebook readers, tablets, laptops and smart watches are now so light and portable that you?d never think of leaving them behind, plus they can add a ton of […]

Shopping for a New Computer?

Shopping for a New Computer?

Shopping for a New Computer? It’s a decision that comes with equal doses of excitement and overwhelm: getting a new computer! Unlike popping out to the shops for a new toaster, choosing the right computer comes with so many questions, most of which are usually asked in some sort of alien language. Helpful sales people […]

Who do you trust with your data?

Who do you trust with your data?

Who do you trust with your data? Confidential and private information is a part of everyday computing from Business transactions, banking, emails and personal photos. You entrust all of these to whomever you leave your computer with. Unfortunately eyes can wonder and personal information can be compromised. The person who is repairing or supporting your […]